[go: up one dir, main page]

US20240235824A9 - Method for Arranging a Shared Cryptographic Key and Method for Encrypted Communication, Computer Program Product and Device - Google Patents

Method for Arranging a Shared Cryptographic Key and Method for Encrypted Communication, Computer Program Product and Device Download PDF

Info

Publication number
US20240235824A9
US20240235824A9 US18/546,516 US202218546516A US2024235824A9 US 20240235824 A9 US20240235824 A9 US 20240235824A9 US 202218546516 A US202218546516 A US 202218546516A US 2024235824 A9 US2024235824 A9 US 2024235824A9
Authority
US
United States
Prior art keywords
point
elliptic curve
shared
mapping
cryptographic key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US18/546,516
Other versions
US12489609B2 (en
US20240137213A1 (en
Inventor
Fabrizio De Santis
Pascale Böffgen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens AG
Original Assignee
Siemens AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens AG filed Critical Siemens AG
Assigned to SIEMENS AKTIENGESELLSCHAFT reassignment SIEMENS AKTIENGESELLSCHAFT ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: De Santis, Fabrizio, PASCALE, BÖFFGEN
Publication of US20240137213A1 publication Critical patent/US20240137213A1/en
Publication of US20240235824A9 publication Critical patent/US20240235824A9/en
Application granted granted Critical
Publication of US12489609B2 publication Critical patent/US12489609B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves

Definitions

  • Teachings of the present disclosure include methods for arranging a cryptographic key, which can be carried out with higher security against quantum computer attacks than known methods for arranging cryptographic keys. Some embodiments include methods for encrypted communication, which can be carried out with higher security against quantum computer attacks.
  • the first point is subjected to a point compression before it is sent, and/or a point compression of the second point is reversed after it is received.
  • the isomorphic mapping ( ⁇ ) maps the second elliptic curve (E) onto the first elliptic curve (E′) non-trivially, i.e. non-identically, and/or the inverse mapping (W) with respect to the isomorphic mapping ( ⁇ ) maps the first elliptic curve (E′) non-trivially, i.e. non-identically, onto the second elliptic curve (E).
  • the first point (A) is a first multiple, formed (CALCAQ) with a first secret factor (a), of the image under the isomorphic mapping ( ⁇ ) of the common point (P) of the second elliptic curve (E), and in which the second point (B) is a multiple, formed (CALCBQ) with a second secret factor (b), of the image of the common point (P) of the second elliptic curve (E) under the isomorphic mapping ( ⁇ ).
  • the shared cryptographic key is determined by multiplying the image of the second point (B) under the inverse mapping (W) by the first secret factor (a) and/or by multiplying the image of the first point (A) under the inverse mapping (W) by the second secret factor (b).
  • some embodiments include a method for encrypted communication, in which a shared cryptographic key is arranged by means of a method for arranging a shared cryptographic key as claimed in any one of the preceding claims and the communication is encrypted (ENCM) and/or decrypted (DECM) by means of the cryptographic key or a key derived from the cryptographic key.
  • ENCM encrypted
  • DECM decrypted
  • some embodiments include a computer program product, designed for carrying out one or more of the methods described herein.
  • some embodiments include a device, in particular IoT device (BOB) and/or field device (ALICE), which is configured and designed for carrying out one or more of the methods described herein.
  • BOB IoT device
  • AICE field device
  • the device further comprises a point calculation device (RODET) which is designed to calculate the first point (A), comprising a transmitting device which is configured for transmitting (SUBMA, SUBMAQ) the first point (A), and comprising a receiving device which is designed for receiving (RECB) the second point (B) and also comprising a key determination device (KEYCALC) which is designed to determine (CALCK) the shared cryptographic key by means of the second point (B).
  • RODET point calculation device
  • KEYCALC key determination device
  • the device further comprises a communication device which is designed for transmitting (SUBMM) and/or receiving (RECM) encrypted messages (ME) and which is designed for encryption (ENCM) and/or decryption (DECM) with the shared cryptographic key.
  • a communication device which is designed for transmitting (SUBMM) and/or receiving (RECM) encrypted messages (ME) and which is designed for encryption (ENCM) and/or decryption (DECM) with the shared cryptographic key.
  • FIG. 1 shows, schematically in a principle diagram, a first and a second elliptic curve as well as a common point and a first and a second point, which are used in a first embodiment of the method shown in FIG. 2 for arranging a shared cryptographic key;
  • FIG. 2 shows, schematically in a principle diagram, a schematic illustration of the method incorporating teachings of the present disclosure for agreeing a shared cryptographic key and a method for encrypted communication using the first and second elliptic curve and the first and second point according to FIG. 1 ;
  • FIG. 3 shows, schematically in a principle diagram, the first and a second elliptic curve according to FIG. 1 , as well as a common point and a differently calculated first and a differently calculated second transmitted point, which in a further exemplary embodiment of the teachings herein shown in FIG. 4 are used for arranging a shared cryptographic key in a further embodiment;
  • FIG. 4 shows a schematic representation of the further exemplary embodiment of a method incorporating teachings of the present disclosure for arranging a shared cryptographic key and a further exemplary embodiment of a method for encrypted communication using the first and second elliptic curve and the differently calculated first and the differently calculated second point according to FIG. 3 , schematically in a principle diagram.
  • isomorphy and “isomorphic mapping” are used synonymously.
  • ⁇ (R) the image of the point R under the isomorphy ⁇ or as the image under the isomorphy ⁇ of the point R.
  • a first point of a first elliptic curve is selected and sent to the communication partner by means of the at least one public channel, and a second point of the first elliptic curve of the communication partner is received, the shared key being determined by means of an inverse mapping, which is an inverse mapping with respect to a shared isomorphic mapping of a second elliptic curve onto the first elliptic curve, applied to the second point of the first elliptic curve.
  • an elliptic curve this is to be understood to mean an elliptic curve over a finite body.
  • a factor for multiplying a point this means a discrete logarithm in the group of points of the elliptic curve.
  • the multiplication of the point of the elliptic curve results in a multiple of the point of the elliptic curve.
  • An integer multiple of the point of the elliptic curve also forms a point of the elliptic curve.
  • the notation for an integer multiple of a point R of an elliptic curve is either lR or l*R, where l is the integer. This is also referred to as “scalar multiplication” lR or l*R.
  • a cryptographic key this is understood in particular to mean a secure key exchange via the public channel, i.e. a key exchange in which, even if the public channel is intercepted, the security of the cryptographic key is not effectively compromised, or at least not without the use of quantum computers.
  • a point of the first elliptic curve is not necessarily used for the construction of a cryptographic key, but instead the methods described herein allow, by means of the inverse mapping, a point on a second elliptic curve different from the first elliptic curve to be agreed as a cryptographic key.
  • the second elliptic curve may be publicly known.
  • the first elliptic curve is not easily open to access by attackers, since only a first and a second point of the first elliptic curve are exchanged via the public channel.
  • the first and second point of the first elliptic curve are not exchanged completely via the public channel but instead a so-called point compression, known per se, is applied for the first and second point.
  • This point compression makes it impossible, or at least significantly more difficult, to reconstruct the parameters of the first elliptic curve from the information exchanged via the public channel.
  • a public channel for the purposes of this invention is understood to mean a channel in which information transmitted and/or received by means of the channel is not kept secret.
  • the information transmitted, i.e. sent and/or received, via a public channel in the method according to the invention does not compromise the security of the method according to the invention even if the information transmitted via the channel, i.e. sent and/or received, is intercepted, at least not without the use of quantum computers.
  • An item of information or a quantity, which is described as “secret” in the present disclosure is understood to mean information or a quantity which is not transmitted via the public channel in the method according to the invention, since the secret information or quantity would or at least could adversely affect the security of the methods described herein.
  • the isomorphic mapping and the inverse mapping may be secret during the execution of the method and, advantageously, also from the communication partner, i.e. the isomorphic mapping and the inverse mapping are not transmitted via the public channel, but are either arranged between the communication partners in advance or exchanged via a further, secure channel.
  • the first point is subjected to point compression before it is sent, and/or a point compression of the second point is reversed after it is received.
  • sending a point also includes sending information derived from the point and identifying the point, in particular a point compression of the point.
  • receiving a point is also understood to mean receiving information derived from the point and identifying the point. In this, there is a lower risk that the first elliptic curve can be reconstructed from the transferred information such as the point compression, assuming the points transmitted are subjected to point compression.
  • the first elliptic curve and/or the mapping of the first elliptical curve onto the second elliptic curve and/or the mapping of the second elliptic curve onto the first elliptical curve are kept secret and, in particular, not communicated, that is transmitted or received, via the public channel.
  • an isomorphic mapping which maps the second elliptic curve onto the first elliptic curve non-trivially, i.e. non-identically, and wherein the inverse mapping with respect to the isomorphic mapping maps the first elliptic curve non-trivially, i.e. non-identically, onto the second elliptic curve.
  • the first point is the image under the isomorphic mapping of a first multiple, formed with a first secret factor, of a common point of the second elliptical curve
  • the second point is the image under the isomorphic mapping of a second multiple, formed with a second secret factor, of the common point.
  • the application of the isomorphic mapping results in a first and second point which lie on the first elliptic curve.
  • the first point is a first multiple, formed with a first secret factor, of the image under an isomorphic mapping of the common point of the second elliptic curve and the second point is a multiple, formed with a second secret factor, of the image under an isomorphic mapping of the common point of the second elliptic curve.
  • the first and second points lie on the first elliptic curve. It is also possible to calculate directly on the first elliptic curve, which can lead to a speed advantage compared to the calculation on the second elliptic curve if the first elliptic curve is suitably selected.
  • the shared cryptographic key is determined by multiplication of the image under the inverse mapping of the second point by the first secret factor.
  • the first secret factor selected in the method according to the invention is conveniently stored in a protected manner and retrieved to determine the shared cryptographic key.
  • the first secret factor can also be stored in a protected memory and used.
  • a shared cryptographic key is arranged by means of a method for arranging a shared cryptographic key as described above and the communication is encrypted by means of the arranged cryptographic key or a key derived from the shared arranged key in a known manner, and/or the encrypted communication is decrypted using the arranged cryptographic key or a key derived from the shared arranged key.
  • encryption and/or decryption is carried out using the arranged cryptographic key. It is assumed that the key for encryption and/or decryption can also be derived from the arranged key. Encryption and/or decryption with the arranged cryptographic key is thus also understood to mean the encryption and/or decryption with a key derived from the arranged cryptographic key.
  • the methods are computer-implemented.
  • Cryptographic keys can be generated in a known manner, which can be efficiently arranged with computers commonly available at the time of application and which cannot be reconstructed using classical, i.e. those not using the laws of quantum information processing, commonly available computers, or not sufficiently efficiently, without knowledge of the first or second secret factor.
  • the computer program product described herein is designed for carrying out one or more of the methods for encrypted communication and/or for carrying out one or more of the methods for arranging a shared cryptographic key as described above.
  • the device comprises a point calculation device which is designed for calculating the first point, as well as a receiving device which is designed for receiving the second point, and also a key determination device, which is designed for determining the shared cryptographic key by means of the second point.
  • the device has a transmitting device for transmitting the first point.
  • a method in this first embodiment is carried out by a field device ALICE, which is connected to an IoT network IOTN in the form of a cloud network.
  • the field device ALICE arranges a shared cryptographic key with a cloud controller BOB.
  • the methods can also be embodied in other, not separately illustrated exemplary embodiments by other devices, such as mobile computers or mobile communication devices, such as smartphones in particular.
  • field device ALICE and cloud controller BOB are connected by means of a radio channel F, which does not necessarily need to be designed to be protected against external eavesdropping attacks but can be intercepted by eavesdropping devices EVE.
  • the field device ALICE transforms the first multiple a*P onto the first elliptic curve E′ with the isomorphic mapping ⁇ in a method step TRAFOA and thus obtains a first point A intended for transmission.
  • the cloud controller BOB transforms the second multiple b*P onto the first elliptic curve E′ with the isomorphic mapping ⁇ in a method step TRAFOB and thus obtains a second point B intended for transmission.
  • a method step SUBMA the field device ALICE transfers the point A by means of a radio device to the cloud controller BOB, which receives the point A in a method step RECA with a further radio device.
  • the cloud controller BOB In a method step SUBMB, the cloud controller BOB in turn transfers the point B by means of its radio device to the field device ALICE, which receives the point B in a method step RECB with its radio device.
  • the product of the first integer a with the image under the inverse mapping ⁇ of the second point B results in the product of the first integer a and the second integer b, scalar multiplied by the common point P.
  • the field device ALICE selects as large a first integer a as possible
  • the cloud controller BOB selects as large a second integer b as possible.
  • step CALCAQ the field device ALICE calculates a first point A by multiplying the common point Q of the first elliptic curve E′ by the secret first integer a as the multiplication factor.
  • the cloud controller BOB in turn calculates the second point B in a method step CALCBQ by multiplying the common point Q of the first elliptic curve E′ by the secret second integer b as the multiplication factor.
  • the field device ALICE transmits the first point A in a method step SUBMAQ.
  • the cloud controller BOB transfers the second point B in a method step SUBMBQ.
  • the message text in its encrypted form ME is then transmitted via the radio channel F by means of the radio device of the cloud controller BOB in the method step SUBMM.
  • the field device ALICE receives the message text in its encrypted form ME in a method step RECM and decrypts it in a method step DECM.
  • the field device ALICE can also send a message encrypted with the shared cryptographic key K to the cloud controller BOB, which message can be decrypted by the cloud controller BOB with the cryptographic key K.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Various embodiments of the teachings herein include a method for arranging a shared cryptographic key with a communication partner. The method may include: selecting a first point of a first elliptic curve; sending the first point to the communication partner using a public channel; receiving a second point of the first elliptic curve from the communication partner; and determining the shared key using a non-trivial, inverse shared mapping of the second point with respect to a shared isomorphic mapping of a second elliptic curve onto the first elliptic curve.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a U.S. National Stage Application of International Application No. PCT/EP2022/054550 filed Feb. 23, 2022, which designates the United States of America, and claims priority to EP Application No. 21159040.1 filed Feb. 24, 2021, the contents of which are hereby incorporated by reference in their entirety.
  • TECHNICAL FIELD
  • The present disclosure relates to encryption. Various embodiments of the teachings here include methods and/or systems for arranging a shared cryptographic key and to a method for encrypted communication.
  • BACKGROUND
  • The security of current asymmetric cryptography is based, among other things, on the difficulty of solving certain mathematical problems, such as the factorization problem or the problem of calculating the discrete logarithm on elliptical curves. These methods will be vulnerable in future with the advent of powerful quantum computers. Therefore, new cryptographic methods of post-quantum cryptography are currently being developed, i.e. methods that from today's point of view will be secure against future powerful quantum computers.
  • In particular, key exchange methods such as the Elliptic-Curve-Diffie-Hellman key exchange method (ECDH), based on the problem of calculating the discrete logarithm, are at risk from quantum computers. However, methods that are resistant to quantum computer attacks have not yet been standardized, nor has their security been definitively clarified, so that secure post-quantum cryptography is not reliably available as yet. Consequently, cryptography systems based on elliptic curves, such as ECDH, are not sufficiently secure against potential future quantum computer attacks.
  • SUMMARY
  • Teachings of the present disclosure include methods for arranging a cryptographic key, which can be carried out with higher security against quantum computer attacks than known methods for arranging cryptographic keys. Some embodiments include methods for encrypted communication, which can be carried out with higher security against quantum computer attacks.
  • For example, some embodiments include a method for arranging a shared cryptographic key with a communication partner (BOB) by means of at least one public channel (F), in which a first point (A) of a first elliptic curve (E′) is selected (CHOA) and sent (SUBMA, SUBMAQ) to the communication partner (BOB) by means of the at least one public channel (F), and a second point (B) of the first elliptic curve (E′) of the communication partner (BOB) is received (RECB), the shared key being determined (CALCK) by means of a non-trivial, inverse shared mapping (W) of the second point (B) of the first elliptic curve (E′) with respect to a shared isomorphic mapping (Φ) of a second elliptic curve (E) onto the first elliptic curve (E′).
  • In some embodiments, the first point is subjected to a point compression before it is sent, and/or a point compression of the second point is reversed after it is received.
  • In some embodiments, the isomorphic mapping (Φ) maps the second elliptic curve (E) onto the first elliptic curve (E′) non-trivially, i.e. non-identically, and/or the inverse mapping (W) with respect to the isomorphic mapping (Φ) maps the first elliptic curve (E′) non-trivially, i.e. non-identically, onto the second elliptic curve (E).
  • In some embodiments, the first point (A) is the image under the isomorphic mapping (Φ) of a first multiple, formed with a first secret factor (a), of a common point (P) of the second elliptical curve (E), and in which the second point (B) is the image under the isomorphic mapping (Φ) of a second multiple, formed with a second secret factor (b), of the common point (P) of the second elliptic curve (E).
  • In some embodiments, the first point (A) is a first multiple, formed (CALCAQ) with a first secret factor (a), of the image under the isomorphic mapping (Φ) of the common point (P) of the second elliptic curve (E), and in which the second point (B) is a multiple, formed (CALCBQ) with a second secret factor (b), of the image of the common point (P) of the second elliptic curve (E) under the isomorphic mapping (Φ).
  • In some embodiments, the shared cryptographic key is determined by multiplying the image of the second point (B) under the inverse mapping (W) by the first secret factor (a) and/or by multiplying the image of the first point (A) under the inverse mapping (W) by the second secret factor (b).
  • As another example, some embodiments include a method for encrypted communication, in which a shared cryptographic key is arranged by means of a method for arranging a shared cryptographic key as claimed in any one of the preceding claims and the communication is encrypted (ENCM) and/or decrypted (DECM) by means of the cryptographic key or a key derived from the cryptographic key.
  • In some embodiments, the method is computer-implemented.
  • As another example, some embodiments include a computer program product, designed for carrying out one or more of the methods described herein.
  • As another example, some embodiments include a device, in particular IoT device (BOB) and/or field device (ALICE), which is configured and designed for carrying out one or more of the methods described herein.
  • In some embodiments, the device further comprises a point calculation device (RODET) which is designed to calculate the first point (A), comprising a transmitting device which is configured for transmitting (SUBMA, SUBMAQ) the first point (A), and comprising a receiving device which is designed for receiving (RECB) the second point (B) and also comprising a key determination device (KEYCALC) which is designed to determine (CALCK) the shared cryptographic key by means of the second point (B).
  • In some embodiments, the device further comprises a communication device which is designed for transmitting (SUBMM) and/or receiving (RECM) encrypted messages (ME) and which is designed for encryption (ENCM) and/or decryption (DECM) with the shared cryptographic key.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • In the following the teachings of the present disclosure are explained in more detail based on exemplary embodiments illustrated in the drawing. In the drawings:
  • FIG. 1 shows, schematically in a principle diagram, a first and a second elliptic curve as well as a common point and a first and a second point, which are used in a first embodiment of the method shown in FIG. 2 for arranging a shared cryptographic key;
  • FIG. 2 shows, schematically in a principle diagram, a schematic illustration of the method incorporating teachings of the present disclosure for agreeing a shared cryptographic key and a method for encrypted communication using the first and second elliptic curve and the first and second point according to FIG. 1 ;
  • FIG. 3 shows, schematically in a principle diagram, the first and a second elliptic curve according to FIG. 1 , as well as a common point and a differently calculated first and a differently calculated second transmitted point, which in a further exemplary embodiment of the teachings herein shown in FIG. 4 are used for arranging a shared cryptographic key in a further embodiment; and
  • FIG. 4 shows a schematic representation of the further exemplary embodiment of a method incorporating teachings of the present disclosure for arranging a shared cryptographic key and a further exemplary embodiment of a method for encrypted communication using the first and second elliptic curve and the differently calculated first and the differently calculated second point according to FIG. 3 , schematically in a principle diagram.
  • DETAILED DESCRIPTION
  • In the following text the terms “isomorphy” and “isomorphic mapping” are used synonymously. For an isomorphy Φ from an elliptic curve F to an elliptic curve F′ and for any point R on the elliptic curve F, we define Φ(R) as the image of the point R under the isomorphy Φ or as the image under the isomorphy Φ of the point R.
  • In the method according to the invention for arranging a shared cryptographic key with a communication partner by means of at least one public channel, a first point of a first elliptic curve is selected and sent to the communication partner by means of the at least one public channel, and a second point of the first elliptic curve of the communication partner is received, the shared key being determined by means of an inverse mapping, which is an inverse mapping with respect to a shared isomorphic mapping of a second elliptic curve onto the first elliptic curve, applied to the second point of the first elliptic curve.
  • Wherever the present application mentions an elliptic curve, this is to be understood to mean an elliptic curve over a finite body. Wherever the present application mentions a factor for multiplying a point, this means a discrete logarithm in the group of points of the elliptic curve. The multiplication of the point of the elliptic curve results in a multiple of the point of the elliptic curve. An integer multiple of the point of the elliptic curve also forms a point of the elliptic curve. The notation for an integer multiple of a point R of an elliptic curve is either lR or l*R, where l is the integer. This is also referred to as “scalar multiplication” lR or l*R.
  • Wherever the present application mentions an arrangement of a cryptographic key, this is understood in particular to mean a secure key exchange via the public channel, i.e. a key exchange in which, even if the public channel is intercepted, the security of the cryptographic key is not effectively compromised, or at least not without the use of quantum computers.
  • A point of the first elliptic curve is not necessarily used for the construction of a cryptographic key, but instead the methods described herein allow, by means of the inverse mapping, a point on a second elliptic curve different from the first elliptic curve to be agreed as a cryptographic key. The second elliptic curve may be publicly known. However, the first elliptic curve is not easily open to access by attackers, since only a first and a second point of the first elliptic curve are exchanged via the public channel.
  • In some embodiments, the shared key is determined by means of a non-trivial, inverse shared mapping of the second point of the first elliptic curve with respect to a shared isomorphic mapping of a second elliptic curve onto the first elliptic curve, in such a manner that the second point is mapped with the non-trivial inverse shared mapping.
  • In some embodiments, the first and second point of the first elliptic curve are not exchanged completely via the public channel but instead a so-called point compression, known per se, is applied for the first and second point. This point compression makes it impossible, or at least significantly more difficult, to reconstruct the parameters of the first elliptic curve from the information exchanged via the public channel. Thus, even with quantum computers an attack on the method for arranging a cryptographic key will be significantly more difficult than attacks on known methods such as the ECDH.
  • The methods described herein can also be implemented particularly easily in products. In product development, only the isomorphic and inverse mapping need to be implemented in addition to an existing ECDH implementation, i.e. the necessary adjustments compared to ECDH implementations are very minor.
  • A public channel for the purposes of this invention is understood to mean a channel in which information transmitted and/or received by means of the channel is not kept secret. The information transmitted, i.e. sent and/or received, via a public channel in the method according to the invention does not compromise the security of the method according to the invention even if the information transmitted via the channel, i.e. sent and/or received, is intercepted, at least not without the use of quantum computers.
  • An item of information or a quantity, which is described as “secret” in the present disclosure, is understood to mean information or a quantity which is not transmitted via the public channel in the method according to the invention, since the secret information or quantity would or at least could adversely affect the security of the methods described herein.
  • The isomorphic mapping and the inverse mapping may be secret during the execution of the method and, advantageously, also from the communication partner, i.e. the isomorphic mapping and the inverse mapping are not transmitted via the public channel, but are either arranged between the communication partners in advance or exchanged via a further, secure channel.
  • In some embodiments, the first point is subjected to point compression before it is sent, and/or a point compression of the second point is reversed after it is received. In the context of the present disclosure, therefore, the phrase “sending a point” also includes sending information derived from the point and identifying the point, in particular a point compression of the point. The phrase “receiving a point” is also understood to mean receiving information derived from the point and identifying the point. In this, there is a lower risk that the first elliptic curve can be reconstructed from the transferred information such as the point compression, assuming the points transmitted are subjected to point compression.
  • In some embodiments, the first elliptic curve and/or the mapping of the first elliptical curve onto the second elliptic curve and/or the mapping of the second elliptic curve onto the first elliptical curve are kept secret and, in particular, not communicated, that is transmitted or received, via the public channel.
  • In some embodiments, an isomorphic mapping is used which maps the second elliptic curve onto the first elliptic curve non-trivially, i.e. non-identically, and wherein the inverse mapping with respect to the isomorphic mapping maps the first elliptic curve non-trivially, i.e. non-identically, onto the second elliptic curve.
  • In some embodiments, the first point is the image under the isomorphic mapping of a first multiple, formed with a first secret factor, of a common point of the second elliptical curve, and the second point is the image under the isomorphic mapping of a second multiple, formed with a second secret factor, of the common point. In this, the application of the isomorphic mapping results in a first and second point which lie on the first elliptic curve.
  • In some embodiments, the first point is a first multiple, formed with a first secret factor, of the image under an isomorphic mapping of the common point of the second elliptic curve and the second point is a multiple, formed with a second secret factor, of the image under an isomorphic mapping of the common point of the second elliptic curve. In this, the first and second points lie on the first elliptic curve. It is also possible to calculate directly on the first elliptic curve, which can lead to a speed advantage compared to the calculation on the second elliptic curve if the first elliptic curve is suitably selected.
  • In some embodiments, the shared cryptographic key is determined by multiplication of the image under the inverse mapping of the second point by the first secret factor. For this purpose, the first secret factor selected in the method according to the invention is conveniently stored in a protected manner and retrieved to determine the shared cryptographic key. In principle, the first secret factor can also be stored in a protected memory and used.
  • A shared cryptographic key is arranged by means of a method for arranging a shared cryptographic key as described above and the communication is encrypted by means of the arranged cryptographic key or a key derived from the shared arranged key in a known manner, and/or the encrypted communication is decrypted using the arranged cryptographic key or a key derived from the shared arranged key.
  • In the following examples, encryption and/or decryption is carried out using the arranged cryptographic key. It is assumed that the key for encryption and/or decryption can also be derived from the arranged key. Encryption and/or decryption with the arranged cryptographic key is thus also understood to mean the encryption and/or decryption with a key derived from the arranged cryptographic key.
  • In some embodiments, the methods are computer-implemented. Cryptographic keys can be generated in a known manner, which can be efficiently arranged with computers commonly available at the time of application and which cannot be reconstructed using classical, i.e. those not using the laws of quantum information processing, commonly available computers, or not sufficiently efficiently, without knowledge of the first or second secret factor.
  • The computer program product described herein is designed for carrying out one or more of the methods for encrypted communication and/or for carrying out one or more of the methods for arranging a shared cryptographic key as described above.
  • In some embodiments, a device incorporating teachings of the present disclosure comprises an IoT device and/or a field device and/or a cloud controller and is configured and designed to carry out a method for encrypted communication and/or to carry out a method for arranging a shared cryptographic key as described above. In some embodiments, the device may be a computer, such as a smartphone, or any other device designed for the exchange of confidential data.
  • In some embodiments, the device comprises a point calculation device which is designed for calculating the first point, as well as a receiving device which is designed for receiving the second point, and also a key determination device, which is designed for determining the shared cryptographic key by means of the second point. In addition, the device has a transmitting device for transmitting the first point.
  • In some embodiments, the device also has a communication device which is designed for sending and/or receiving encrypted messages and which is designed for encryption and/or decryption with the shared cryptographic key.
  • A first elliptic curve E′ and a second elliptic curve E are used. The first elliptic curve E′ is derived from the second elliptic curve E as an image under the isomorphic mapping Φ of the second elliptic curve E. An inverse mapping Ψ also exists with respect to the isomorphic mapping Φ of the second elliptic curve E onto the first elliptic curve E′, which maps the first elliptic curve E′ onto the second elliptic curve E.
  • As illustrated in FIG. 2 , a method in this first embodiment is carried out by a field device ALICE, which is connected to an IoT network IOTN in the form of a cloud network. The field device ALICE arranges a shared cryptographic key with a cloud controller BOB. In principle, the methods can also be embodied in other, not separately illustrated exemplary embodiments by other devices, such as mobile computers or mobile communication devices, such as smartphones in particular.
  • In a first example method for arranging a shared cryptographic key with a communication partner, the field device ALICE agrees the elliptic curve E, the isomorphic mapping Φ and—derived from the isomorphic mapping—also the inverse mapping Ψ with the communication partner, in this case the cloud controller BOB. In addition, a common point P of the elliptic curve E is agreed with the communication partner in advance.
  • To exchange information between the field device ALICE and the cloud controller BOB, field device ALICE and cloud controller BOB are connected by means of a radio channel F, which does not necessarily need to be designed to be protected against external eavesdropping attacks but can be intercepted by eavesdropping devices EVE.
  • In order to arrange a shared cryptographic key, in a first step CHOA the field device ALICE first selects a sufficiently large first integer as randomly as possible, with which it multiplies the common point P of the second elliptic curve E in a method step CALCAP. The field device ALICE keeps the first integer secret and stores it purely internally in a data memory of the field device ALICE that is not shown separately. This first multiple a*P of the common point P in turn forms a point of the second elliptic curve E. In a comparable step CHOB, the cloud controller BOB also selects a random and sufficiently large second integer b, by which it multiplies the common point P of the second elliptic curve E in a method step CALCBP. The cloud controller BOB keeps the second integer b secret and stores it in a data memory of the cloud controller BOB. This second multiple b*P in turn forms a point of the second elliptic curve E.
  • The field device ALICE transforms the first multiple a*P onto the first elliptic curve E′ with the isomorphic mapping Φ in a method step TRAFOA and thus obtains a first point A intended for transmission.
  • The cloud controller BOB transforms the second multiple b*P onto the first elliptic curve E′ with the isomorphic mapping Φ in a method step TRAFOB and thus obtains a second point B intended for transmission.
  • The field device ALICE has a point determination device KODET for carrying out the method steps CHOA, CALCAP and TRAFOA, which determines the point A in a computer-implemented and software-controlled procedure. Likewise, the cloud controller BOB has a point determination device KODET for carrying out the method steps CHOB, CALCBP and TRAFOB, which determines the point B in a computer-implemented and software-controlled procedure.
  • In a method step SUBMA the field device ALICE transfers the point A by means of a radio device to the cloud controller BOB, which receives the point A in a method step RECA with a further radio device.
  • In a method step SUBMB, the cloud controller BOB in turn transfers the point B by means of its radio device to the field device ALICE, which receives the point B in a method step RECB with its radio device.
  • To transfer the first point A and the second point B the radio channel F can be used, since the knowledge of point A and point B by the eavesdropper EVE does not compromise the security of the method according to the invention for arranging a shared cryptographic key. This is because the first point A and the second point B are not transferred completely but are compressed with point compression before transfer.
  • The field device ALICE has a key calculation device KEYCALC, which takes the point B received from the cloud controller BOB and calculates the shared cryptographic key K by applying the inverse mapping Ψ. For this purpose, the field device ALICE has a key calculation device CALCK in the form of a software-controlled processor. The key calculation device CALCK applies the inverse mapping Ψ to the second point B obtained from the cloud controller BOB and multiplies the result by the first integer a, kept secret by the field device ALICE:

  • K=a*Ψ(B)=a*Ψ(Φ(b*P))=ab*P,
  • that is, the product of the first integer a with the image under the inverse mapping Ψ of the second point B results in the product of the first integer a and the second integer b, scalar multiplied by the common point P.
  • Accordingly, the cloud controller BOB also has a key calculation device CALCK, which applies the inverse mapping Ψ to the first point A obtained from the field device ALICE. The key calculation device CALCK of the cloud controller BOB multiplies the result by the second integer b, kept secret by the cloud controller:

  • K=b*Ψ(A)=b*Ψ(Φ(a*P))=ab*P,
  • that is, the cryptographic key K computed by the cloud controller BOB matches the cryptographic key K computed by the field device ALICE.
  • Since the cryptographic key K has never been transmitted in plain text via the radio channel F and also cannot be calculated from the compressed points A and B transmitted via the radio channel F, the cryptographic key K is suitable for encrypting a message in a known manner.
  • In the above embodiment, if the isomorphic mapping were to be replaced by an identity relation, i.e. if the second elliptic curve E were to match the first elliptic curve E′, the above method for arranging a shared key would be identical to the known Elliptic-Curve Diffie-Hellman key exchange protocol. In the present exemplary embodiment, however, the isomorphic mapping Φ is a non-trivial, i.e. non-identical, mapping of the second elliptic curve E onto the first elliptic curve E′ so that the known Elliptic-Curve Diffie-Hellman key exchange protocol is explicitly not included in the scope of the present disclosure.
  • In a further exemplary embodiment, which is explained by reference to FIGS. 3 and 4 , it is also the case that the field device ALICE selects as large a first integer a as possible, and the cloud controller BOB selects as large a second integer b as possible. But instead of first determining the first point A on the second elliptic curve E by multiplication of the common point P (CALCAP) and then transforming to the first elliptic curve E′ (TRAFOA), as described above using FIGS. 1 and 2 , in a method step TRAFOP the common point P of the second elliptic curve E is instead initially mapped onto the first elliptic curve E′ by means of the isomorphic mapping Φ and therefore converted into the common point Q on the first elliptic curve E′. The cloud controller BOB also initially maps the common point P of the second elliptic curve E onto the first elliptic curve E′ in the common point Q by means of the method step TRAFOP.
  • Subsequently, in step CALCAQ the field device ALICE calculates a first point A by multiplying the common point Q of the first elliptic curve E′ by the secret first integer a as the multiplication factor. The cloud controller BOB in turn calculates the second point B in a method step CALCBQ by multiplying the common point Q of the first elliptic curve E′ by the secret second integer b as the multiplication factor.
  • Subsequently, the field device ALICE transmits the first point A in a method step SUBMAQ. The cloud controller BOB transfers the second point B in a method step SUBMBQ.
  • The remaining method steps are similar to those of the first exemplary embodiment as described above. In this refinement of the invention also, the shared key K is given by

  • K=b*Ψ(A)=a*Ψ(B)=ab*P
  • and can be calculated identically by the field device ALICE and the cloud controller BOB.
  • The cloud controller BOB now uses the cryptographic key K as shown in FIGS. 2 and 4 for encrypting a message in a method incorporating teachings of the present disclosure for encrypted communication. For this purpose, the cloud controller BOB encrypts the message with the cryptographic key K in a method step ENCM, which results in an encrypted form ME of the message text.
  • The message text in its encrypted form ME is then transmitted via the radio channel F by means of the radio device of the cloud controller BOB in the method step SUBMM. The field device ALICE receives the message text in its encrypted form ME in a method step RECM and decrypts it in a method step DECM.
  • Of course, although not shown separately, the field device ALICE can also send a message encrypted with the shared cryptographic key K to the cloud controller BOB, which message can be decrypted by the cloud controller BOB with the cryptographic key K.

Claims (10)

What is claimed is:
1. A method for arranging a shared cryptographic key with a communication partner, the method comprising:
selecting a first point of a first elliptic curve;
sending the first point to the communication partner using a public channel;
receiving a second point of the first elliptic curve from the communication partner; and
determining the shared key using a non-trivial, inverse shared mapping of the second point with respect to a shared isomorphic mapping of a second elliptic curve onto the first elliptic curve.
2. The method as claimed in claim 1, further comprising
subjecting the first point to a point compression before sending, and/or
reversing a point compression of the second point after receiving.
3. The method as claimed in claim 1, wherein
the isomorphic mapping maps the second elliptic curve onto the first elliptic curve non trivially; and/or
the inverse mapping with respect to the isomorphic mapping maps the first elliptic curve non-trivially, onto the second elliptic curve.
4. The method as claimed in claim 3, wherein:
the first point comprises the image under the isomorphic mapping of a first multiple, formed with a first secret factor, of a common point of the second elliptical curve; and
the second point comprises the image under the isomorphic mapping of a second multiple, formed with a second secret factor, of the common point of the second elliptic curve.
5. The method as claimed in claim 1, wherein:
the first point comprises a first multiple, formed with a first secret factor, of the image under the isomorphic mapping of the common point of the second elliptic curve; and
the second point comprises a multiple, formed with a second secret factor of the image of the common point of the second elliptic curve under the isomorphic mapping.
6. The method as claimed in claim 1, wherein the shared cryptographic key is determined by multiplying the image of the second point under the inverse mapping by the first secret factor and/or by multiplying the image of the first point under the inverse mapping by the second secret factor.
7. A method for encrypted communication, the method comprising:
arranging a shared cryptographic key is arranged by:
selecting a first point of a first elliptic curve;
sending the first point to the communication partner using a public channel;
receiving a second point of the first elliptic curve from the communication partner; and
determining the shared key using a non-trivial, inverse shared mapping of the second point with respect to a shared isomorphic mapping of a second elliptic curve onto the first and
encrypting or decrypting the communication using the cryptographic key or a key derived from the cryptographic key.
8-10. (canceled)
11. A device comprising:
a point calculation device designed selecting a first point of a first elliptic curve;
a transmitting device sending the first point to the communication partner using a public channel;
a receiving device receiving a second point of the first elliptic curve from the communication partner; and
a key determination device determining the shared key using a non-trivial, inverse shared mapping of the second point with respect to a shared isomorphic mapping of a second elliptic curve onto the first elliptic curve.
12. The device as claimed in claim 11, further comprising a communication device transmitting and/or receiving encrypted messages and encryption and/or decryption with the shared cryptographic key.
US18/546,516 2021-02-24 2022-02-23 Method for arranging a shared cryptographic key and method for encrypted communication, computer program product and device Active 2042-10-03 US12489609B2 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
EP21159040 2021-02-24
EP21159040.1 2021-02-24
EP21159040.1A EP4050839A1 (en) 2021-02-24 2021-02-24 Method for agreeing a shared cryptographic key and encrypted communication method and computer program product and device
PCT/EP2022/054550 WO2022180112A1 (en) 2021-02-24 2022-02-23 Method for arranging a shared cryptographic key and method for encrypted communication, computer program product and device

Publications (3)

Publication Number Publication Date
US20240137213A1 US20240137213A1 (en) 2024-04-25
US20240235824A9 true US20240235824A9 (en) 2024-07-11
US12489609B2 US12489609B2 (en) 2025-12-02

Family

ID=74732792

Family Applications (1)

Application Number Title Priority Date Filing Date
US18/546,516 Active 2042-10-03 US12489609B2 (en) 2021-02-24 2022-02-23 Method for arranging a shared cryptographic key and method for encrypted communication, computer program product and device

Country Status (4)

Country Link
US (1) US12489609B2 (en)
EP (2) EP4050839A1 (en)
CN (1) CN116941217A (en)
WO (1) WO2022180112A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4050839A1 (en) * 2021-02-24 2022-08-31 Siemens Aktiengesellschaft Method for agreeing a shared cryptographic key and encrypted communication method and computer program product and device
JP7717672B2 (en) * 2022-10-24 2025-08-04 株式会社東芝 Encrypted communication system, encrypted communication device, encrypted communication method, and encrypted communication program

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5442707A (en) * 1992-09-28 1995-08-15 Matsushita Electric Industrial Co., Ltd. Method for generating and verifying electronic signatures and privacy communication using elliptic curves
US7079650B1 (en) * 1999-07-09 2006-07-18 Oberthur Card Systems Sa Computing method for elliptic curve cryptography
US20060206793A1 (en) * 2005-03-10 2006-09-14 Kabushiki Kaisha Toshiba Document file management apparatus, document file management method and document file management program
US20080165955A1 (en) * 2004-03-03 2008-07-10 Ibrahim Mohammad K Password protocols using xz-elliptic curve cryptography
US7587047B2 (en) * 2005-06-22 2009-09-08 Apple Inc. Chaos generator for accumulation of stream entropy
US20110138475A1 (en) * 2008-07-30 2011-06-09 Telefonaktiebolaget L M Ericsson (Publ) Systems and method for providing trusted system functionalities in a cluster based system
US20110271344A1 (en) * 2009-02-16 2011-11-03 Yuji Unagami Illegal module identifying device, information processing device, illegal module identifying method, illegal module identifying program, integrated circuit, illegal module disabling system, and illegal module disabling method
US20150142733A1 (en) * 2013-11-18 2015-05-21 Ori Software Development Ltd. System and method for efficient management of big data in a database using streaming tables
US20150172412A1 (en) * 2012-07-06 2015-06-18 Cornell University Managing dependencies between operations in a distributed system
US9584320B1 (en) * 2014-12-23 2017-02-28 EMC IP Holding Company LLC Blinding function in elliptic curve cryptography
US20180001210A1 (en) * 2013-08-22 2018-01-04 Riot Games, Inc. Systems and methods that enable customizable teams for multi-player online games
US20180060037A1 (en) * 2016-08-23 2018-03-01 Interana, Inc. Methods for highly efficient data sharding
US20190356650A1 (en) * 2018-05-21 2019-11-21 Wickr Inc. Local Encryption for Single Sign-On
US20200081874A1 (en) * 2017-06-02 2020-03-12 Facebook, Inc. Data placement and sharding
US20200242156A1 (en) * 2017-09-29 2020-07-30 Oracle International Corporation Handling semi-structured and unstructured data in a sharded database environment
US10805081B1 (en) * 2020-04-30 2020-10-13 ISARA Corporation Processing batches of point evaluations in a supersingular isogeny-based cryptosystem
US10812265B1 (en) * 2020-04-30 2020-10-20 ISARA Corporation Using cryptographic co-processors in a supersingular isogeny-based cryptosystem
US20210075610A1 (en) * 2017-12-13 2021-03-11 nChain Holdings Limited System and method for multi-party generation of blockchain-based smart contract
US20210194677A1 (en) * 2016-03-23 2021-06-24 Telefonaktiebolaget Lm Ericsson (Publ) Cyber-physical context-dependent cryptography
US20220054550A1 (en) * 2019-04-30 2022-02-24 Memorial Sloan-Kettering Cancer Center Combination therapies
US20240137213A1 (en) * 2021-02-24 2024-04-25 Siemens Aktiengesellschaft Method for Arranging a Shared Cryptographic Key and Method for Encrypted Communication, Computer Program Product and Device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10161137B4 (en) * 2001-12-12 2008-02-14 Siemens Ag Method and system for cryptographically processing data

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5442707A (en) * 1992-09-28 1995-08-15 Matsushita Electric Industrial Co., Ltd. Method for generating and verifying electronic signatures and privacy communication using elliptic curves
US7079650B1 (en) * 1999-07-09 2006-07-18 Oberthur Card Systems Sa Computing method for elliptic curve cryptography
US20080165955A1 (en) * 2004-03-03 2008-07-10 Ibrahim Mohammad K Password protocols using xz-elliptic curve cryptography
US20060206793A1 (en) * 2005-03-10 2006-09-14 Kabushiki Kaisha Toshiba Document file management apparatus, document file management method and document file management program
US7587047B2 (en) * 2005-06-22 2009-09-08 Apple Inc. Chaos generator for accumulation of stream entropy
US20110138475A1 (en) * 2008-07-30 2011-06-09 Telefonaktiebolaget L M Ericsson (Publ) Systems and method for providing trusted system functionalities in a cluster based system
US20110271344A1 (en) * 2009-02-16 2011-11-03 Yuji Unagami Illegal module identifying device, information processing device, illegal module identifying method, illegal module identifying program, integrated circuit, illegal module disabling system, and illegal module disabling method
US20150172412A1 (en) * 2012-07-06 2015-06-18 Cornell University Managing dependencies between operations in a distributed system
US20180001210A1 (en) * 2013-08-22 2018-01-04 Riot Games, Inc. Systems and methods that enable customizable teams for multi-player online games
US20150142733A1 (en) * 2013-11-18 2015-05-21 Ori Software Development Ltd. System and method for efficient management of big data in a database using streaming tables
US9584320B1 (en) * 2014-12-23 2017-02-28 EMC IP Holding Company LLC Blinding function in elliptic curve cryptography
US20210194677A1 (en) * 2016-03-23 2021-06-24 Telefonaktiebolaget Lm Ericsson (Publ) Cyber-physical context-dependent cryptography
US20180060037A1 (en) * 2016-08-23 2018-03-01 Interana, Inc. Methods for highly efficient data sharding
US20200081874A1 (en) * 2017-06-02 2020-03-12 Facebook, Inc. Data placement and sharding
US20200242156A1 (en) * 2017-09-29 2020-07-30 Oracle International Corporation Handling semi-structured and unstructured data in a sharded database environment
US20210075610A1 (en) * 2017-12-13 2021-03-11 nChain Holdings Limited System and method for multi-party generation of blockchain-based smart contract
US20190356650A1 (en) * 2018-05-21 2019-11-21 Wickr Inc. Local Encryption for Single Sign-On
US20220054550A1 (en) * 2019-04-30 2022-02-24 Memorial Sloan-Kettering Cancer Center Combination therapies
US10805081B1 (en) * 2020-04-30 2020-10-13 ISARA Corporation Processing batches of point evaluations in a supersingular isogeny-based cryptosystem
US10812265B1 (en) * 2020-04-30 2020-10-20 ISARA Corporation Using cryptographic co-processors in a supersingular isogeny-based cryptosystem
US20240137213A1 (en) * 2021-02-24 2024-04-25 Siemens Aktiengesellschaft Method for Arranging a Shared Cryptographic Key and Method for Encrypted Communication, Computer Program Product and Device

Also Published As

Publication number Publication date
CN116941217A (en) 2023-10-24
WO2022180112A1 (en) 2022-09-01
EP4050839A1 (en) 2022-08-31
US12489609B2 (en) 2025-12-02
EP4264878A1 (en) 2023-10-25
US20240137213A1 (en) 2024-04-25

Similar Documents

Publication Publication Date Title
JP7119040B2 (en) Data transmission method, device and system
US11431498B2 (en) Quantum-augmentable hybrid encryption system and method
US10187361B2 (en) Method for secure communication using asymmetric and symmetric encryption over insecure communications
CN111130803B (en) Method, system and device for digital signature
US12506599B2 (en) Methods and systems for secure network communication
US20180013555A1 (en) Data transmission method and apparatus
JP2020532177A (en) Computer-implemented systems and methods for advanced data security, high-speed encryption, and transmission
US10686587B2 (en) Method for safeguarding the information security of data transmitted via a data bus and data bus system
US12244580B2 (en) Encrypted data communication and gateway device for encrypted data communication
US12132838B2 (en) Secret code verification protocol
US12489609B2 (en) Method for arranging a shared cryptographic key and method for encrypted communication, computer program product and device
CN117914483A (en) Secure communication method, apparatus, device and medium
EP3871363A2 (en) Computing key rotation period for block cipher-based encryption schemes system and method
US10880278B1 (en) Broadcasting in supersingular isogeny-based cryptosystems
CN101317357B (en) Key management
CN115021906A (en) Method, terminal and device for realizing data transmission of digital envelope
US12289409B2 (en) Privacy preserving identity data exchange based on hybrid encryption
KR20030047148A (en) Method of messenger security based on client/server using RSA
JP2005167635A (en) Apparatus and data transmission / reception method
CN110419195A (en) Data management method and system based on proxy re-encryption in IOT lightweight terminal environment
CN117997522A (en) Quantum session key-based data interaction method, electronic equipment and medium
CN111431846B (en) Method, device and system for data transmission
KR101758232B1 (en) method of encryption or decryption a data block, apparatus for encryption or decryption a data block, and storage medium for storing a program for encryption or decryption a data block
CN119030690A (en) A network communication method based on encryption mechanism
CN114528569A (en) Homomorphic calculation method and system, homomorphic request, calculation and service equipment

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

AS Assignment

Owner name: SIEMENS AKTIENGESELLSCHAFT, GERMANY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PASCALE, BOEFFGEN;DE SANTIS, FABRIZIO;REEL/FRAME:066814/0934

Effective date: 20230818

Owner name: SIEMENS AKTIENGESELLSCHAFT, GERMANY

Free format text: ASSIGNMENT OF ASSIGNOR'S INTEREST;ASSIGNORS:PASCALE, BOEFFGEN;DE SANTIS, FABRIZIO;REEL/FRAME:066814/0934

Effective date: 20230818

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: ALLOWED -- NOTICE OF ALLOWANCE NOT YET MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE